Information Security Risk Management Handbook: Handbook for ISO/IEC 27001 - Softcover

Humphreys, Ted

 
9780580607455: Information Security Risk Management Handbook: Handbook for ISO/IEC 27001

Críticas

How to manage the risks of insider trading, and disgruntled staff hacking into computer systems and stealing? This well laid out book takes you through the risk assessment, and controls (a measure that is modifying risk), and not forgetting monitoring and reviews (all documented). This way you can address every risk from acceptable use of email and company computers to student placements and the contract cleaners. --www.professionalsecurity.co.uk

Reseña del editor

This book is a practical handbook for the use and application of ISO/IEC 27005. It provides guidance and advice to specifically support the implementation of those requirements specified in ISO/IEC 27001:2005 that relate to risk management processes and associated activities. The focus of this book is based around the concept of having an information security management system (ISMS) as a framework for achieving the effective management of information security risks. International standard ISO/IEC 27001 is a world recognised standard for establishing, implementing, monitoring and reviewing, updating and improving an ISMS. ISO/IEC 27005 is an ISMS risk management standard that supports the implementation of ISO/IEC 27001. This book is aimed at those business managers and staff involved in ISMS risk management activities. It is a practical handbook for the use and application of ISO/IEC 27005. It provides guidance and advice to specifically support the implementation of those requirements specified in ISO/IEC 27001:2005 that relate to risk management processes and associated activities. Contents include: Introduction, Nature of the Information Security Risk Landscape, Risk Management Framework, Risk Assessment, Risk Treatment, System of Risk Controls, Risk Monitoring and Reviews, Risk Control Improvements, Documentation System, Audits and Reviews, Standards, Definitions, Examples of legal and regulatory compliance, Examples of assets, threats, vulnerabilities and risk assessment methods.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.